Passwords can be defined as the string of characters that are utilized for verifying the identity of any specific user during the process of authentication (Li et al., 2013). There are various types of password security attacks in today’s cyber world and these are extremely vulnerable for the user (Chen, Kuo & Wuu, 2014). The most popular password attacks are brute force, reverse brute force, dictionary attack, keylogger attack, social engineering attackS, offline cracking of password, resetting of the password and many more.
The following term paper outlines a brief discussion on the attacking and protecting of passwords. The various types of password attacks are well defined here with proper description. Moreover, the countermeasures of all these password attacks will also be given in this term paper. The prevention of the passwords with cracking attacks will be described here. The final part of the part discusses about the authentication methods, used for preserving all these passwords.
Definition of Passwords
A password can be defined as the string of characters that are used for the authentication of a user on any computer system. Most of the passwords consist of several characters that include numbers, letters, symbols and special characters (Li, 2013). Passwords usually do not consist of any space. It is generally a unique combination of numbers and letters and never contains actual words. When a user logs into an account, either social media or bank account, he or she provides his or her username and password. Usernames are usually public information, whereas passwords are absolutely private to every user.
Types of Password Attacks
There are various types of password attacks. They are as follows:
iii) Dictionary Attacks: The dictionary attacks are the brute-force attacks that are used for determining the decryption key by simply trying hundreds of similar possibilities.
vii) Resetting of Password: Resetting of passwords is done, when someone has used a password for a longer period of time or has forgotten the password (Dua et al., 2013). The entire password is changed with proper security measures. However, while resetting the password, attacks can occur by spammers or hackers.
Countermeasures or Prevention of Passwords with Cracking Attacks
iii) Dictionary Attack: The most effective counter measure against the dictionary attacks is Delayed Response. The somewhat delayed response from any particular server can easily prevent any hacker and spammer from checking the several passwords in a short span of time. Hence, dictionary attack is prevented.
vii) Resetting of Password: The best prevention method or countermeasure of resetting of password is password encryption. This particular method helps to keep the password in an encrypted format, so that it is not easily cracked by any specific user. When the password is rest, it is automatically authenticated and protected from any type of attack.
Authentication Methods Used for Preserving Passwords
There are some of the most important and significant authentication methods that are used for preserving passwords. They are as follows:
iii) Authentication by Database: Databases can authenticate the users in attempting to connect to the databases with the help of utilizing information that is being stored within the database. For using the database authentication, the user should create an account with the associated password and then after successfully providing username and password, a connection is established (Dua et al., 2013). The user passwords are stored within a data dictionary in the encrypted format.
Conclusion
Therefore, from the above discussion, it can be concluded that passwords are the most basic security mechanisms, which comprise of the secret pass phrases that are created with the help of alphabetic, alphanumeric, symbolic characters, numeric or the combination of any two. These passwords are used for the conjunction of usernames and so that the users can easily gain access to the devices. However, in spite of having several advantages, these passwords could be hacked by attackers or hackers with the motive of wrong deeds. The above term paper has outlined a brief discussion on the passwords and various types of password attacks. Relevant details are provided regarding the types of password attacks. Several countermeasures of all these above mentioned password attacks are also provided here. The prevention or password with the cracking attacks are also given here. The prevention method that is used for the brute force cracking method and the prevention method, used for key logger attack are well defined in this term paper. The authentication methods that are utilized for the preserving of passwords are also given here.
References
Chen, B. L., Kuo, W. C., & Wuu, L. C. (2014). Robust smart?card?based remote user password authentication scheme. International Journal of Communication Systems, 27(2), 377-389.
Dua, G., Gautam, N., Sharma, D., & Arora, A. (2013). Replay attack prevention in Kerberos authentication protocol using triple password. arXiv preprint arXiv:1304.3550.
Franchi, E., Poggi, A., & Tomaiuolo, M. (2015). Information and password attacks on social networks: An argument for cryptography. Journal of Information Technology Research (JITR), 8(1), 25-42.
Garman, C., Paterson, K. G., & Van der Merwe, T. (2015, August). Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS. In USENIX Security Symposium (pp. 113-128).
Jiang, Q., Ma, J., Li, G., & Li, X. (2015). Improvement of robust smart?card?based password authentication scheme. International Journal of Communication Systems, 28(2), 383-393.
Khan, A. A. (2013). Preventing phishing attacks using one time password and user machine identification. arXiv preprint arXiv:1305.2704.
Lee, C. C., Liu, C. H., & Hwang, M. S. (2013). Guessing Attacks on Strong-Password Authentication Protocol. IJ Network Security, 15(1), 64-67.
Li, C. T. (2013). A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. IET Information Security, 7(1), 3-10.
Li, X., Niu, J., Khan, M. K., & Liao, J. (2013). An enhanced smart card based remote user password authentication scheme. Journal of Network and Computer Applications, 36(5), 1365-1371.
Silver, D., Jana, S., Boneh, D., Chen, E. Y., & Jackson, C. (2014, August). Password Managers: Attacks and Defenses. In USENIX Security Symposium (pp. 449-464).
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download